Research conducted by technology evaluation firm Comparitech has uncovered at least 179 Industrial Control System (ICS) devices directly exposed to the public internet and configured to communicate using the insecure Modbus protocol without any form of authentication. These vulnerable systems are linked to highly critical entities, including a national railway and two national power grids, making them prime targets for disruption by malicious actors. The findings, which likely represent only a fraction of the total exposure, corroborate recent government warnings about nation-state adversaries targeting Operational Technology (OT). The research highlights a critical failure in security fundamentals and a pervasive lack of visibility, as noted by cybersecurity firm Dragos, which estimates that over 90% of global OT networks lack the necessary monitoring to detect such threats.
What Was Found: The research identified 179 ICS devices (e.g., PLCs, RTUs) accessible from the internet that were actively listening for connections on TCP port 502, the default port for the Modbus protocol.
The Core Vulnerability: Modbus is a serial communications protocol developed in 1979. Its common implementation over TCP/IP (Modbus/TCP) lacks any native security features like authentication or encryption. This means that anyone who can connect to the device on port 502 can send it valid commands, such as:
Who's Affected: The exposed devices were linked to critical infrastructure sectors globally, with specific mentions of:
Impact: A successful attack on one of these devices could have severe physical consequences. An attacker could shut down a section of a power grid, change a railway switch, or disrupt a manufacturing process, leading to blackouts, accidents, or significant economic damage. This direct exposure allows attackers to bypass the traditional attack path of compromising an IT network first and then pivoting to the OT network.
The vulnerability is not a software flaw in the traditional sense, but a critical architectural and configuration failure. The protocol is working as designed; the failure is in connecting a non-authenticated protocol to the world's most hostile network.
T1595.002 - Vulnerability Scanning): Attackers use tools like Shodan, Censys, or masscan to search the entire internet for devices responding on TCP port 502.T1190 - Exploit Public-Facing Application): The 'application' in this case is the Modbus service itself. Access is gained simply by connecting to the open port.T1213 - Data from Information Repositories): Once connected, an attacker can send Modbus 'read' commands to query all available data points on the device, effectively mapping out its function and the process it controls.T0829 - Control Device): After discovery, the attacker can send Modbus 'write' commands to alter the device's configuration, shut it down, or manipulate its process, leading to a physical impact.The simplicity of this attack is what makes it so dangerous. It requires no exploit code, no zero-days, and no sophisticated tools—just a basic understanding of the Modbus protocol and the IP address of a target.
The business impact of exploiting one of these exposed devices ranges from severe to catastrophic. For a national power grid, it could mean widespread blackouts, economic disruption, and even civil unrest. For a railway, it could lead to collisions or derailments, resulting in loss of life. The research from Comparitech, while focused on a small number of devices, points to a systemic problem. The lack of OT network visibility reported by Dragos means that most organizations are likely unaware of these exposures, making them ticking time bombs in the face of increased nation-state interest in targeting critical infrastructure.
| Type | Value | Description |
|---|---|---|
port |
502 |
Default Modbus/TCP port. Any unsolicited inbound traffic from the internet to this port is a critical security finding. |
url_pattern |
Shodan search: port:502 |
Organizations should be proactively running searches like this, scoped to their own IP ranges, to find and remediate exposures. |
network_traffic_pattern |
Internet -> DMZ -> OT Network on Port 502 |
Even in a segmented network, allowing Modbus traffic from the internet into the OT environment is a high-risk configuration that should be eliminated. |
log_source |
Perimeter Firewall Logs |
Regularly review logs for any traffic, allowed or denied, on port 502. Allowed traffic is a critical misconfiguration; denied traffic indicates active scanning by adversaries. |
502 (Modbus), 44818 (EtherNet/IP), and 102 (S7comm). This is not an intrusion detection problem; it's a security hygiene problem. (D3FEND Technique: D3-VSS: Vulnerability Scan Scrutiny)M1030 - Network Segmentation)Isolating the OT network from the internet is the single most important mitigation for this threat.
Strict firewall rules should be in place to block all access to OT-related ports like 502 from the internet.
The most fundamental defense against the threat of exposed Modbus devices is strict inbound traffic filtering at the network perimeter. Organizations must configure their border firewalls with a default-deny policy. Specifically, create an explicit rule to block all inbound traffic on TCP port 502 from any source. This rule should be placed at the top of the firewall policy to ensure it is enforced. This simple, yet critical, action prevents attackers from even discovering the device via internet-wide scans. Organizations should regularly audit their firewall rulebases to ensure such a rule is in place and has no exceptions. This is a basic security hygiene practice that directly mitigates the risk highlighted by the Comparitech research.
Organizations with OT assets cannot rely solely on passive defense; they must actively hunt for their own exposures. This involves implementing a continuous program of external attack surface management. Use vulnerability scanning tools or subscribe to services that constantly scan your organization's public IP ranges for open ports and services. Specifically configure these scans to look for OT ports like 502 (Modbus), 102 (S7), and 44818 (EtherNet/IP). The results of these scans must be fed directly into a remediation workflow, with critical findings like an open Modbus port triggering a high-priority alert for the security and network teams. This proactive self-scanning turns the tables, allowing you to find and fix vulnerabilities before adversaries do.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats